Sciweavers

3640 search results - page 710 / 728
» Combining Fuzzy Information from Multiple Systems
Sort
View
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
14 years 10 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
105
Voted
CVPR
2008
IEEE
16 years 2 months ago
Robust 3D face recognition in uncontrolled environments
Most current 3D face recognition algorithms are designed based on the data collected in controlled situations, which leads to the un-guaranteed performance in practical systems. I...
Cheng Zhong, Zhenan Sun, Tieniu Tan, Zhaofeng He
95
Voted
VIS
2007
IEEE
86views Visualization» more  VIS 2007»
16 years 1 months ago
Illustrative Deformation for Data Exploration
Abstract--Much of the visualization research has focused on improving the rendering quality and speed, and enhancing the perceptibility of features in the data. Recently, significa...
Carlos Correa, Deborah Silver, Min Chen
WWW
2003
ACM
16 years 1 months ago
Ontology-Based Image Retrieval
The binary form of an image does not tell what the image is about. It is possible to retrieve images from a database using pattern matching techniques, but usually textual descript...
Avril Styrman, Eero Hyvönen, Kim Viljanen, Sa...
101
Voted
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
15 years 7 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...